Domain 4: Communicatins and Network Security Flashcards

1
Q

Simplex
Half-Duplex
Full Duplex

A

Simplex: One way, like a car radio

Half-Duplex: sends or receives one at a time

Full Duplex: sends and receives simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Baseband

Broadband

A

Baseband

  • One channel. Can only receive one signal at a time.
  • Ethernet networks

Broadband

  • Multiple channels
  • Can send and receive multiple signals
  • Cable TV
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PAN

GAN

A

PAN: Personal Area Network:

  • Low power wireless technologies
  • Bluetooth

GAN: Global Area Networks
-A collection of WANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet Switched Network

A
  • Data is broken into packets and each sent individually
  • Chooses the best route/different route
  • Reassembled by receiving node
  • Missing packets can be resubmitted
  • Out of order packets can be re-sequenced
  • Makes unused bandwidth available for other connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI Model Layers - Functions

A
  1. Application - Network process to applications
  2. Presentation - Data Representation
  3. Session - Interhost Communication
  4. Transport - End-to-End Connections
  5. Network - Address and Best Path
  6. Data Link - Access to Media
  7. Physical - Binary transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSI Model Benefits

A
  • Reduces complexity
  • Standardizes interfaces
  • Facilitates modular interfaces
  • Ensures interoperability
  • Accelerates evolution
  • Simplifies teaching and learning
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Layer 1: Physical Layer

A
  • Describes units of data as bits represented by energy.
  • Cabling
  • Devices- hubs and repeaters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI Model Layers - Packages

A
  1. Application - protocol data units
  2. Presentation - protocol data units
  3. Session - protocol data units
  4. Transport - segment (TCP)/Datagram (UDP)
  5. Network - packets
  6. Data Link - frames
  7. Physical - bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Layer 2: Data Link

A

-Handles access to the physical layer as well as local area network communications
-Divided into two sub-layers
>Media Access Control (MAC) - transfers to and from the the physical layer - touches layer 1
>Logical Link Control (LLC) - handles LAN Communications - Touches Layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer 3: Network

A
  • Describes routing: moving data from a system on one LAN to a system on another
  • Provides connectivity and path selection between two end systems
  • Routing
  • IP Addresses and router
  • IPv4 IPv6
  • Also called logical address
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 4: Transport

A
  • Handles packet sequencing, flow control and error detection
  • Concerned with transportation issues between hosts
  • Data transport reliability
  • Establish, maintains and terminate virtual circuits
  • Fault detection and recovery
  • Information flow control
  • TCP Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layer 5: Session

A
  • Connections between applications
  • Manages sessions
  • provides maintenance on connections
  • Remote call procedures (RPC)
  • Simplex, half, full duplex communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Layer 6: Presentation

A
  • Presents data to the application and user in a comprehensible way
  • Insures data is readable by receiving system
  • Format of the data
  • Negotiates data transfer syntax for application layer
  • Concepts include data conversion
  • JPEG, GIF, HTML
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Layer 7: Application

A

-Where users interface with computer application
-Web browser, work processor, IM app
-Provides network services to application process such as email, file transfer
Protocol Telnet, FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP/IP Model

A
  • Application Layer
  • Transport Layer (Host To Host)
  • Internet Layer
  • Network Access
  • created by US Defense Advanced Research Projects Agency in 1970s
  • Suite of protocols including UDP, ICMP Layer 4
  • IP Layer 3
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP/IP Model OSI Model

A

TCP/ IP vs. OSI
Application Layer = Application Layer
Presentation Layer
Session Layer

Transport (Host To Host) Layer = Transport Layer

Internet Layer = Network Layer

Network Access = Data Link Layer
Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TCP - Transmission Control Protocols

A
  • Connection-oriented protocol
  • supports dialogues between source and destination
  • packages information into segments
  • provides reliable full-duplex
  • supports flow control
  • retransmission
18
Q

UDP - User Datagram Protocol

A
  • connectionless protocols
  • packages information into datagrams
  • does not provide flow control
  • error processing and retransmission must be handled by other protocols
  • unrealiable
19
Q

Encapsulation

A
  • Takes information from a higher layer and adds a header to it.
  • The higher layer sees information as data
20
Q

MAC Addresses

A

-48 bits long
.first 24 form the Organizationally unique identifier
.last 24 form serial number (extension identifier)

-IEEE created the EUI-64 for 64 bit MAC addresses

21
Q

IP V4

A
  • 32-bit address field allows 2(32) or nearly 4.3 billion addresses
  • IP header field is 20 bytes long
  • Designed in the 1970s to support packet-switched network
  • Requires a “helper protocol” called ICMP
  • IP in connectionless and unreliable. Provided best effort
  • Connection and reliability has to be provided by protocol carrier like TCP
22
Q

IPv4 IP Fragmentation

A

-Maximum Transmission Unit (MTU): maximum PDU size of a network

  • Fragmentation breaks a large packet into multiple smaller packets
  • Typical MTU size for an IP packet is 1500 bytes
23
Q

IPv6

A
  • Larger address space (128-bit address compared to IPv4’s 32 bits)
  • 2(128)
  • 340 sextillion addresses
  • IPv6 header is 40 bytes vs. 20 bytes of IPv4
24
Q

IP v6 Address and Configuration

A
  • Can stateless configure a unique address. No need for static addressing or DHCP
  • Stateless takes the host;s MAC and uses it to configure IP
  • DHCP be used with IPv6. Called “Stateful Autoconfiguration”
25
Q

IPv4 IP address Ranges

A
Class A: 0-126
Class B: 128-191
Class C: 192-223
Class D: 224-239
Class E: 240-255
26
Q

RFC 1918 Addressing

A

Three blocks of IP addresses are set aside

  • 10.0 - 10.225
  • 127 - Loopback
  • 172.16 - 172-31
  • 192.168
27
Q

ARP RARP

A

Address Resolution Protocol (ARP)
.Used to translate between layer 2 MAC address and Layer 3 IP address
.Asks who has IP address …

RARP
.Used in diskless workstations
.Node asks:”Who had MAC address at 00:48:

28
Q

TCP

A

.Reliable Layer 4 protocol
.Uses 3 way handshake (SYN, SYN-ACK,SYN back)
can reorder segments that arrive out of order
.Header 20 bites long

29
Q

Socket Pair

A

.Combination of an IP address and a TCP-UDO port on one node

30
Q

TCP Flags

A
URG: Packets contains urgent data
ACK: Acknowledge received data
PSH: Push data to application layer
RST: Reset (tear down) a connection
SYN: Synchronize a connection
FIN: Finish a connection (gracefully)
CWR: Congestion Window Reduced
ECE: Explicit Congestion Notification Echo)
31
Q

TCP Handshake

A
  1. The client chooses the initial sequence number, set in the first SYN packet
  2. The server also chooses its own initial sequence number, set in the SYN/ACK packet
  3. Each side acknowledges the other’s sequence number by incrementing it. This is the acknowledgement number.
  4. Once the connection is established, ACK, typically each segment.
32
Q

DNS - Domain Name Service

A
  • A distributed global hierarchical database that translates names to IP addresses and vice versa
  • Uses both TCP and UDP

DNS Security Extension DNCSEC
-provided authentication and integrity to DNS response via the use of public key encryption

33
Q

Ethernet (CSMA/CD CSMA/CA)

A

Carrier Sense Multiple Access
- Collision Detection
.Monitor network to see if idle before transmit
.Used in wired ethernet

  • Collision Avoidance (CA)
    . used for systems such as 802.11 wireless that cannot send and receive simultaneously
    . relies on acknowledgement from the receiving station.
34
Q

Private IP Address Ranges

A
  • 10.0.0.0–10.255.255.255 (a full Class A range)
  • 172.16.0.0–172.31.255.255 (16 Class B ranges)
  • 192.168.0.0–192.168.255.255 (256 Class C ranges)
35
Q

Routing Protocols - Interior

A

Distance Vector: maintain list of destination networks along with metrics
. RIP- Routing Information Protocol
. IGRP- Interior Gateway Routing Protocol
. EIGRP

Link State: Gather router characteristics, like latency
.OSPF
.ISISI

36
Q

Routing Protocols - Exterior

A

Path vector routing protocol” make next hop decisions based on the entire remaining path to the destination
.BGP- Border Gateway Protocol

37
Q

Spread Spectrum

A

Spread spectrum means that communication occurs over multiple frequencies. Thus, a message is broken into pieces, and each piece is sent at the same time but using a different frequency. Effectively this is a parallel communication rather than a serial communication.

38
Q

Firewall Types

A

.Static Packet-Filtering Firewalls: filters traffic by examining data from a message header

.Application-Level Firewall: filters traffic based in a single internet service, protocol, or application

.Circuit-Level Firewalls: used to establish connections between trusted partners (Layer 5 -Session Layer)

.Stateful Inspection Firewall: evaluate the state, session, context of network traffic. (Layer 3, Network Layer)

.Next-Generation Firewall:  MFD UTM, composed of several security features,
>application filtering
>deep packet inspection
.TLS offloading
.content filter
IPD,PDS

.Internal Segmentation Firewall: deployed between internal network segments.

39
Q

Proxies

A

Proxy server are a variation of an Application-level firewall or circuit-level firewall.
.used to mediate between clients and servers.

> Forward proxy is a standard or common proxy that acts as an intermediary for queries of external resources. A forward proxy handles queries from internal clients when accessing outside services.

> Reverse proxy provides the opposite function of a forward proxy; it handles inbound requests from external systems to internally located services. A reverse proxy is similar to the functions of port forwarding and static NAT

40
Q

Endpoint detection and response (EDR)

A

.Focuses on both endpoint device as well as network communication.

.EDR is an evolution of traditional anti-malware products, IDS, and firewall solutions. EDR seeks to detect, record, evaluate, and respond to suspicious activities and events, which may be caused by problematic software or by valid and invalid users.

41
Q

IEEE 802.1X

A

.Defines the use of encapsulated EAP to support a wide range of authentication options for LAN connections.

.The IEEE 802.1X standard is formally named “Port-Based Network Access Control

42
Q

Tunneling

A

.Network communications process that protects the contents of protocol packets by encapsulating them in packets of another protocol.

Split tunnel: VPN configuration that allows a VPN-connected client system (i.e., remote node) to access both the organizational network over the VPN and the internet directly at the same time.

Full tunnel: VPN configuration in which all of the client’s traffic is sent to the organizational network over the VPN link, and then any internet-destined traffic is routed out of the organizational network’s proxy or firewall interface to the internet